Google, Inc. discovered that the TurkTrust certification authorityincluded in the Network Security Service libraries (nss) mis-issuedtwo intermediate CA's which could be used to generate rogue end-entitycertificates. This update explicitly distrusts those two intermediateCA's. The two existing TurkTrust root CA's remain active.

For the stable distribution (squeeze), this problem has been fixed inversion 3.12.8-1+squeeze6.

For the testing distribution (wheezy), this problem has been fixed inversion 2:3.13.6-2.

For the unstable distribution (sid), this problem has been fixed inversion 2:3.14.1.with.ckbi.1.93-1.

We recommend that you upgrade your nss packages.

Further information about Debian Security Advisories, how to applythese updates to your system and frequently asked questions can befound at: http://www.debian.org/security/